Static task
static1
Behavioral task
behavioral1
Sample
e7d3a8529d2b864ee0b3e26d3ba3e764b9fbba4054ee94d6f48b89b0cc591b3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e7d3a8529d2b864ee0b3e26d3ba3e764b9fbba4054ee94d6f48b89b0cc591b3e.exe
Resource
win10v2004-20220901-en
General
-
Target
e7d3a8529d2b864ee0b3e26d3ba3e764b9fbba4054ee94d6f48b89b0cc591b3e
-
Size
344KB
-
MD5
781cd790dfd4a4c818c74f1066294ee6
-
SHA1
82e98518bbd1f75b57aec3d71c61c7d3ac7d73cc
-
SHA256
e7d3a8529d2b864ee0b3e26d3ba3e764b9fbba4054ee94d6f48b89b0cc591b3e
-
SHA512
4dbe4f4e23845dd0f476e944fc01353b3084feb120d43053d86fe7adeb7e43c3202877b4c654c18b20c52b6d4cac43c031f3fde21c045f96c61bab24158c661f
-
SSDEEP
6144:fVK/zXSGhIQsYBcqDXfJYO3AYy5bqqIg:fVK7X3hIQs2cexP3AF
Malware Config
Signatures
Files
-
e7d3a8529d2b864ee0b3e26d3ba3e764b9fbba4054ee94d6f48b89b0cc591b3e.exe windows x86
d7e9b88f92582d506614fddf37b48115
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetStdHandle
CloseHandle
CreateFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
MoveFileA
DeleteFileA
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapReAlloc
GetCommandLineA
GetVersion
SetHandleCount
GetFileType
GetStartupInfoA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetProcAddress
GetModuleHandleA
HeapDestroy
VirtualFree
VirtualAlloc
ReadFile
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetFilePointer
WriteFile
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
FlushFileBuffers
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
LoadLibraryA
SetEndOfFile
RaiseException
GetFileAttributesA
GetCurrentProcessId
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 64KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hrdata Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE